Experiment Tracks Spread of 'Stolen Data' Online
A security research firm says more than a thousand people accessed a dummy database of personal details that it released as an experiment, though that number is much likely higher. It says the would-be criminals acted far faster than most security breaches take to fix.
The experiment was the work of BitGlass, a company that offers security services for cloud computing firms. The firm wanted to test how quickly a 'leaked' set of personal data would spread around the world; to do so, BitGlass made an Excel file that contained 1,568 sets of names, phone numbers, addresses, credit card numbers and social security numbers.
BitGlass says that the profiles were completely fake and didn't match any real individual, thus making it 'safe' to release online. The researchers also added a hidden watermark that sent them a message whenever the file was opened. They then made the file publicly available through the file storage and sharing service Dropbox.
'Stolen' Data Published On Dark Net
BitGlass then published the data on seven sites known to be used by cyber criminals that exchange stolen data. The websites were part of the dark net, a term used to describe a hidden network on the Internet; the data is therefore not available via an ordinary web browser or search engines.
After 12 days, the baited files had racked up 1,100 views with 47 people downloading the database. It was downloaded to 22 countries across the five largest continents, with Nigeria and Russia showing the most interest. The watermark also revealed that many people who viewed the files came from university networks, though that may have been because such networks often have unsecured WiFi. (Source: darkreading.com)
"People do cross-examine [the information] and download it, looking for breached data ... Our goal was to see how liquid the market is [when it comes to accessing such data] ... We didn't put it up for sale ... We were curious to see what happens to it after a breach," says Nat Kausik, CEO of Bitglass.
Criminals Vet Data Before Downloading
According to BitGlass, the most interesting finding is just how many people looked at the data before downloading it. That suggests many would-be criminals carefully vet leaked data to make sure it is genuine before trying to take advantage.
On one hand, it's hardly surprising that so many would-be criminals showed an interest in what they thought might be 'free' personal data. On the other, it's possible that the real number of individuals that viewed the data was likely much higher, because cybercriminals are likely to employ ways to disable the watermark tracking. (Source: theverge.com)
What's Your Opinion?
Are you surprised by how widely word of the supposedly-stolen data spread online? Do you think the findings show firms handling personal data need to be even quicker to react when there's a real breach? Or do you think the experiment is too flawed to draw any firm conclusions?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
Interesting but not really real-world
These are interesting findings but I think most cybercriminals would block the watermark, so I think the data is not very representative of a real-world scenario. If we could go back in time and track the downloads from big data breaches of Target and pastebin (for example), that would be far more revealing. But as they say, hindsight is 20/20 and even so, my example isn't even plausible.
I have a idea?
This just proves there is more than just a handful of criminals out there wanting this kind of data, and that these security breaches will always be happening. Even if this is not a accurate sample of the real world experience of data proliferation.
I would suggest that the banks and credit card company's, let their account holders take a more proactive solution to making such data useless. By having a lock-out page on their web site that would be user friendly. Where you could set up a denial of payment to any charges from another country, state or county. To unblock the lock-out you would just have to go and unchecked a box and answer your security(a misnomer I know) question that you have set up at the time, just before you travel outside of your authorized area. If you do have a recurring charge from a company of another country, you could enter it into a white list.
The more this kind of denial of payments systems are in effect, the less valuable the data breach would be.